Are you looking for a digital website credibility checklist that is interactive?

It is no secret more information is available everyday online. We as educators need to instruct our students to vet online content, but we as educators also need to stay abreast on our skills for vetting content. Below is a link to a Google Sheet which includes checkboxes for vetting content online. The spreadsheet also includes a formula which determines whether the source is likely credible or not based on the number of boxes checked.

Privacy has been a concern for many months now given the situation with Facebook and Cambridge. Everything we do online is tracked and traced back to our accounts through web and mobile based applications. Facebook, Google, Microsoft, and all websites and mobile applications collect information regarding your IP address, geographical location, search history, text messages, phone calls, the quizzes on social media, pictures, videos, audio and other information you’ve used while connected to the internet. This could include smart connected cars, thermostats, TVs, banking app (keep in mind the images you used to mobile deposit that’s connected to your phone which is connected to your Google Drive), and baby monitors (Internet of things, IoT). Because all these devices are connected to the internet, it has created jobs for analyst and the advancement of technology such as Artificial Intelligence; however, with anything digital, there are always criminals waiting to take advantage of all this information. Also, the other caveat, like most people, we assume free is a good thing. Except when it involves technology because free, isn’t free. The data associated with the free account is collected, sold and purchased by other organizations trying to fight for American Greenbacks at the expense of Americans privacy. It should be noted that the UK's technology privacy law called General Data Protection Regulation (GDPR) is something essential to prevent organizations from collecting information without approval. Unfortunately, it doesn’t protect Americans, leaving the internet as the Wild West.

I’ve written about the concerns regarding educational technology and student privacy, especially since educational technology can be compromised just like Target’s data information center (Read it here - Since writing the article I've upgraded my Chrome extensions to include Adblock Plus and Disconnect). Also, the FBI has issued a warning stating “widespread collection of student data could have privacy and safety implications if compromised or exploited.” They also provide an example of a cybercriminal accessing multiple school districts’ servers to see student and teacher information regarding health records, demographics, and contact information (Read it here). Therefore, it is vital for us to educate our students and parents and provide recommendations on how to better protect their privacy.

To give you better insight as to what Google tracks regarding you and your accounts, you can visit myactivty.google.com. Log in with a Google accounts and click “Activity Controls” in the left column. Below are the controls to whether Google is tracking your data: 1. Web and App Activity – For most G Suite users, this feature will be paused based on the organization, this feature saves all of your activity through your browser, maps, and other Google services.2. Location History – self-explanatory, but this feature collects each geo location you’ve visited. 3. Device Information – this feature saves your contacts, calendars, apps, and other data. 4. Voice & Audio – as you record your voice, Google collects it to better its software. 5. YouTube Search History – Another data collection method to coincide with Google’s ad service. 6. YouTube Watch History – collects the data for videos you have watched. Pause these controls at your discretion.

The next insight is considering the application permissions available on mobiles devices. Most downloaded apps are granted permission to have access to many other applications on your mobile device. For instance, Facebook app permissions include calendar, camera, contacts, microphone, phone, SMS, storage, and location. So if you are using Google for your Android device and frequently check in via geolocation, then you are providing your location to Facebook and Google. Facebook too, if permitted, would have access to all of the above applications on a mobile device if you allow them to do so. It would be recommended to look at each application on your mobile device to determine what apps have permission to view other apps.

Steven Lahullier wrote an exceptional article on Tech & Learning that showcases the top ten K-12 educational technology trends. Mobiles devices landed at number 2, while IoT fell at number 7. Both are prime examples of how educational technology accounts can be linked with personal accounts, while all the data associated with both accounts are utilized to generate revenue for businesses and provide information for cybercriminals (2017). However, using the above recommendation can help prevent such occurrences.

Using the General Social Survey dataset, last week I discovered using dummy variables that union members hold higher degrees and more income compared to nonunion members. To expand on that research, I am using a Chi Squares test to examine the relationship between the two variables; respondents’ highest degree (dependent variable) and Does respondent or spouse belong to a union (independent variable). Since both variables are measured as categorical, the Chi-Square test will provide additional insights into the relationship (Frankfurt-Nachmias & Leon-Guerrero, 2018).​The results show a p-value of .007, significantly less than the threshold of .05, indicating the rejection of the null hypothesis that union members do not hold higher degrees than nonunion members. Since the Chi-Square test does not reveal the significance of the statistically significant relationship, a Cramer’s V test is used, which results in a value of .074. The Cramer V relationship is between 0 and 1.0, with 1.0 being a strong relationship; thus, in this example, the value of .074 shows a weak relationship between education levels and unionized labor. However, even though the relationship is weak, the dataset does show a statistically significant relationship and therefore, we can assume unionized members earn higher degrees than nonunion members.

Do Americans have a higher Socioeconomic Status (SES) and education level when belonging to a union?

I created 3 dummy variables for the independent variable, “Does R (respondent) or spouse belong to a union” using the High School Longitudinal Study dataset. My reference variable assumes that neither the respondent or spouse belong to a union. Further, the model summary indicates 34% of SES values are affected by the independent variables and the ANOVA test reveals a significance level of .000, well below the conventional threshold of .05, indicating unions do influence SES and education levels (Laureate, 2016).

​In examining the coefficients, SPSS reveals when comparing SES against married couples who are not in the union, SES increases 2.5 – 2.8 units when one spouse belongs to the union, 2.2 units when both spouses belong to the union. Therefore, when comparing respondents, spouses, or married couples within a union, SES increases and so does their higher education level by 4.245 years.

​Diagnostics reveals a Durban Watson value of 1.75 and ANOVA value of .008. Further, the collinearity VIF values for each dummy variable are well below 10 at just above 1.0. Lastly, Cooks Distance values are well below 1.0 and do not have undue influence (Laureate, 2.16m).

VariablesThe purpose of this multiple regression test is to examine whether math teachers’ perceptions of collective responsibility and principal support, the independent variables measured as interval-ratio, affect math teacher self-efficacy, the dependent variable measured as interval-ratio. Each variable data was taken from the High School Longitudinal Study dataset (National Center for Educational Statistics, 2009). Since I am using two independent variables to examine how it affects one dependent variable, multiple regression serves as the best model to complete such task (Frankfort-Nachmias & Leon-Guerrero, 2018). Nonetheless, the multiple regression test reveals a statistically significant relationship between the two independent variables and the dependent variable. Model and ANOVA The model summary reveals an R-value of .21, indicating the Pearson Correlation Coefficient is a slight positive correlation between math teachers’ perceptions of principal support and collective responsibility against math teaching self-efficacy. Also, the Adjusted R Square value of .45, indicates 45% of math teachers’ self-efficacy is affected by their perceptions of principal support and collective responsibility (Laureate Education, 2016).

The ANOVA test reveals an F value of 331.63 at a significance of .000, well below the conventional .05 alpha level, therefore, rejecting the null that math teachers’ self-efficacy is not affected by their perceptions of principal support and collective responsibility. CoefficientsThe Unstandardized Coefficients Beta value for math teacher’s perceptions of principal support is .062, meaning for one unit increase in perceptions of principal support, math teacher’s self-efficacy will increase by .062. A one unit increase in math teacher’s perceptions of collective responsibility, math teacher’s self-efficacy will increase by .165. Lastly, the significance of each independent variable is .000, indicating a rejection of the null that there is no relationship between teacher’s perceptions of principal support and collective responsibility against math teacher’s self-efficacy (Laureate Education, 2016). Therefore, we can conclude that teacher perceptions of principal support and collective responsibility do affect their ability to deliver effective instruction.

SPSS was used to analyze the data from the 2014 General Social Survey data set which reveals both hours watching TV and time spent on the internet during the week affect your socioeconomic status.

​The Model Summary of the Multiple Linear Regression tests reveals that 40% of socioeconomic statuses are explained by the two independent variables; hours spent watching TV and time spent on the internet. The ANOVA test has a significance of .000, below the .05 alpha level indicating the rejection of the null that there is no relationship between variables.

Nonetheless, analyzing the unstandardized coefficients reveals for every unit increase of hours per day watching TV, SES will decrease by 1.668 units. For every unit increase in internet hours per week, SES will increase by .130 units. The significance of each independent variable is statistically significant at the .01 alpha level and are statistically significant predictors of SES. Thus, in laymen terms, the more you watch TV, the less money you will make and the more time you spend on the internet, the more money you will make. However, there are multiple influences that affect hours spent on the internet, some beneficial to income, some not.

The purpose of this bivariate correlation test is to examine whether math teachers’ years of service are correlated with students’ mathematics self-efficacy using the High School Longitudinal study data (National Center for Educational Statistics, 2009). The correlation test is used to determine the level of association between the two variables and the strength of the association (Frankfort-Nachmias & Leon-Guerrero, 2018). The results of the test indicate a p-value of .047, just under the conventional .05 threshold, therefore rejecting the null that there is not a statistically significant relationship between the two variables. Because of the rejection of the null, a linear regression test can be utilized to determine the strength of the relationship.

​Linear Regression TestThe Linear Regression test reveals that for every year of experience a math teacher completes, students’ mathematics self-efficacy increases by .2%. Also, The standardized coefficients value is computed at a level of .017, which indicates a very slight positive correlation between the two variables as it is just above 0 (Frankfort-Nachmias & Leon-Guerrero, 2018). Such statistical data can help provide social change for educators across the globe by helping teachers remain in the field of teaching mathematics. Further, such information could entice further research in examining teacher confidence and ability to deliver seamless instruction.

OverviewThe Education Technology market is closing in on $1.9B and most public-school systems are utilizing 1:1 initiatives to bring more tech to the classroom (Molnar, 2017). The whole school process is being digitized from registration to homework and it is time to stop and consider the vulnerabilities that are being created through technology. First, consider the technology used in administration; registration software, Learning Management System, Student Information System, Website, local servers, and office software. In administration alone, schools are subject to over five vulnerabilities to cyber-attacks and all these technologies are generally integrated with each other. Now add the classroom to the mix. Until recently, I've used roughly five to seven 3rd party integrations with office software during a school year. Now we have over ten vulnerabilities on any given school year that is subject to exposing student and teacher information across the internet. That information could be addresses, social security numbers, grades, assignments, health records, contact information, and online communication.

It doesn't stop there, how many folks have taken the time to research each EdTech company to verify their stance on privacy or security? How many of us actually read the Terms and Agreements? According to Jonathan Obar, 98% of us don’t read those terms and agreements before signing up. In his study, people actually agreed to sharing their private information with the NSA and surrendering their first-born child as payment to have access to technology, the conditions were found in the Terms and Agreements (Vedantam, 2016).

Now you might be a little relieved to find out that both Microsoft and Google have pledged to protect student privacy; however, Google is currently being sued by the state of Mississippi for their current and past notorious bouts with utilizing student data to drive their ad service - this is how they combat their free service with some revenue. This will be a later conversation, but when companies market their free service, it generally isn't free.

Tips before Signing UpAnytime you or administration intends on using and/or integrating Educational Technology into the classroom, visit the website or complete a search on the privacy policy of the company. Check with your organization on how they vet new technologies. Consider creating a board with the organization to help protect student and teacher privacy. Be sure to review the Terms and Agreements before you or your students sign up for new technology. Relate back to Mr. Vedantam’s article on how many people actually read the Terms and Agreements and then visit: http://ptac.ed.gov/document/protecting-student-privacy-while-using-online-educational-services. Is it a paid service or free? If it is free, there is a reason and generally that involves data in some fashion. Unfortunately, the sale of student data is a lucrative business – ask Google. Check with the company to see if they encrypt student data. Reach out to your Internet Service Provider to see how they use your data and be sure to watch out for HTTP vs HTTPS. The S is for security. Know FERPA!

Tools for Protecting Student PrivacyConsider allowing students to turn on in private browsing through the internet browser and ask that they clear the history before logging off of the computer and at home. Be sure to discuss their digital footprint and how it is utilized in data collection. BrowserSpy is a nice tool to check what your internet browser leaves behind. Look for tools such as Privacy badger to block Ads and prevent advertisers from secretly tracking you (Barack, 2017). Use https://privacy.commonsense.org/ to check out Commen Sense Tech evaluations. Lastly, take the pledge: https://studentprivacypledge.org/.

Conclusion:Our data is continuously being tracked, sold and purchased and it is important for students and schools to know and understand the importance of privacy. Carelessness could result in significant problems for students in the future.

Educational Technology And Authentic Learning: The Significant Role Of EdTech In Authentic Learning DevelopmentHopefully you have read Designing Instruction For Authentic Learning and Developing Content For Authentic Learning as I will refer to these articles below. This article is meant to open conversations regarding models for effective technology integration.We have discussed Authentic Learning which is a strategy found under Deeper Learning, its goal is to provide students with critical thinking, problem solving, creativity, and collaboration skills. Research shows that through Deeper Learning Approaches students raise test scores, have higher graduation rates, and are more likely to enroll in post-secondary schooling - including trade schools (American Institute of Research, 2016). The data proves that Authentic Learning works and through my previous two articles you should have gained an excellent foundation for designing and developing your course using Authentic Learning – plus check out New Media Horizon Reports for K12 and Higher Ed; you’ll notice Deeper Learning is listed in both. Now it is time to focus on the role of Educational Technology.

The Role Of Educational TechnologyEducational Technology should be used to provide students with an experience they otherwise wouldn’t have. Chris Dede, a Harvard University Learning Technologies Professor, argues that “technology as a catalyst is effective only when used to enable learning with richer content, more powerful pedagogy, more valid assessments, and links between in- and out-of-classroom learning” (2014, p. 6). Additionally, we must acknowledge that there is an achievement gap which looks something like a bell curve and that the digital divide is a real thing – consider the digital divide when providing experiences.

We also should acknowledge that educational technology complements our design and development and technology alone cannot create learning experiences. Teaching as a human craft is what makes learning effective, not the technology. We certainly do not want something called digital drill and kill by digitizing teacher-centered instruction (Murray, 2017). On the contrary, we want students to apply the knowledge gained by using technology to do better things rather than do things better (Dede, 2017).

Tips For Integrating Technology And Personalizing LearningWe first need to correlate the technology with our unit and course objectives. If we have our students analyzing literature, then the objective should read the same; analyze literature. We could look at the SAMR Model of technology integration, but I think the model alone limits our objective in providing students with Authentic Learning experiences; however, it is a step in the right direction. Remember, we don’t simply want to digitize business! Again, it is providing students with an experience they otherwise wouldn’t have.

Second, look at Gartner’s Hype Cycle and New Media Horizon Reports to determine what technologies are becoming of age, reaching their plateau, or are on the rise because these technologies are going to be embedded in the real world (note there are a few different industries for the Horizon Report and an education version of the Hype Cycle).

Third, remember that instruction is guided and we control rigor based on guidance of each student, therefore, instruction is personalized as each student needs different guidance. Look at the Zone of Proximal Development (ZPD) designed by Lev Vygotsky for more information on guidance and personalized learning. Lastly, use technology in every facet of instruction, it can certainly make the delivery of instruction and feedback more efficient with Learning Management Systems and video production. Take this example in public education, I hate taking attendance and writing it down on paper, it wastes time. Instead, use Kipin Attendance through Canvas (LMS) where students have five minutes into the class to record their attendance, this way I didn’t have to call out names or mark each student’s attendance digitally. It knocked off three minutes of wasted time per class – 180 days X 3 equates to 540 minutes or roughly 2.5 weeks of instruction devoted to attendance!

Nonetheless, we say we want students to do better things through their summative assessment. That doesn’t mean we can’t make other facets of instruction more efficient. Remember the questionable rule that if you feel you need to directly instruct, then create a video. It is still direct instruction but hopefully students complete it at home.

There Really Isn’t An Effective Model – That’s The Problem​The SAMR Model certainly gets educators going in the right direction and creates good conversations. It is even better when utilized with the Bloom’s Taxonomy as we attempt to match assessments with objectives. TPACK makes great arguments that this article coincides. Integrating these 3 models is another great start towards an effective model. What we do know is every facet of teaching should integrate technology, but the assessments should require collaboration, critical thinking, problem solving, and collaboration through Authentic Learning.Do you know a model for effective technology integration? If so, share with us your model or how you integrate technology.References:

How To Develop Content For Authentic LearningLearning by doing is the basis of authentic learning and is considered one of the most effective strategies for instruction (Lombardi, 2007). So why not required this of your students? In my previous article I discussed the importance of assessments and requiring students to apply the skills and theories learned in the course to real world applications while guiding students and requiring that they bridge the gap between the learning materials and the application. This process is not easy and requires a continuous involvement of reflection for both the teacher and student. Keep in mind that the framework has already been completed as you have broken down the summative assessment into units and have written the formative assessments as well as objectives. Nonetheless, learning units should follow this process:

Learn.

Apply (assignment).

Feedback.

Apply (application).

Feedback.

When beginning to design the learning materials it is important to refer to the Perception-action Cyclewritten by Christine Byrd and the MIND Research Institute (2017). The cycle begins by the brain referring to an existing schema. Begin by having students build upon existing knowledge, this is a great opportunity to gain intrinsic motivation and attention – remember that you have already analyzed the student population. We often refer to this as the anticipatory set in K12. Build off this information to introduce the new topic with the learning materials you have designed or curated. If you feel you need to directly instruct, create a video. Avoid the typical slide deck and utilize Adobe Spark or Office Sway to jazz up the delivery. If you love your slide deck then use something like Nearpod to analyze student performance during direct instruction, but remember that this is student centered learning and not teacher centered. Another great tool for video is Edpuzzle! Or whatever authoring tool you enjoy. I’ve used Captivate and Presenter.

Student Assignments And ActivitiesProvide the students an assignment immediately following the introduction of a new topic. This is the perfect opportunity for you to guide students through the assignment and assess who is transferring the new information and who needs additional support. This usually occurs through discussion and doesn’t require the full application of the new knowledge, but instead is chunked to gain a greater understanding. Adult learners utilize this space to provide their skills and experiences in the workforce, but other learners can communicate through worksheets, small group discussion, short essay, group activity, etc... As an instructor, be involved in the conversation, the lower grades need more guidance. Instructors need to reflect on where students stand – are they bridging the gap or need further instruction? Reteach if needed. Provide feedback; good feedback, not just red ink. Some units might require two assignments so students can apply their knowledge in the application.

The perception action cycle has completed one rotation by using the assignment and providing feedback. Students have a new perception of the learning topic now. The cycle will start over again once students apply the new knowledge or transfer knowledge. Keep in mind that the application has already been designed as it was discussed in the previous article. However, it may need developed (written directions, exemplary work, etc…) and/or tweaked. Once students complete the application, provide feedback, analyze the data, and then go back to the design phase as noted in the previous article to make adjustments to the course. No course is ever too awesome and things change, edTech changes and the tools in the career fields change.

Feedback As The Most Important Aspect Of The Learning ProcessDr. Orlando wrote a fantastic piece on how to provide feedback like a coach instead of a teacher:“As teachers we spend a lot of time telling students what they did wrong, but very little time showing them what doing it right looks like. Modeling good work is a key component of feedback—and improving student or player performance.” (2014)

He continues to discuss how education has created this grade-obsessed cultural monster where students and teachers alike are too fixated on the product instead of the process and that we lose focus of the objectives. Correlate this with Dr. Dweck’s book titled Growth Mindset and you can see how guidance and feedback control the learning process instead of limiting the outcome to a single grade. This process is much easier when creating authentic learning instead of direct instruction and a multiple-choice exam to assess transfer of knowledge.References: